The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Building ExeQuantum: The Challenges of Innovating in a Market That Doesn’t Know It’s at Risk Yet
As the CEO of ExeQuantum, I spend my days immersed in the world of post-quantum cryptography (PQC), a space that feels both ahead of its time and painfully urgent. The irony is clear, while the quantum threat is rapidly approaching, most industries still treat security as an afterthought, something to worry about later. The frustrating part? "Later" ...

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms
Explore advanced strategies to protect medical devices from cyberattacks, ensuring patient safety and healthcare integrity.

What’s New in Microsegmentation in 2025
Know what microsegmentation vendors are offering in 2025 to boost zero trust strategies and counter advanced cyber threats.

The Four Horsemen of Emerging Tech: How Quantum Computing, AI, Blockchain, and Cybersecurity Are Shaping the Future
The convergence of Quantum Computing, AI, Blockchain, and Cybersecurity is redefining the technological landscape. These interconnected innovations are revolutionizing industries and reshaping digital trust, security, and efficiency. Understanding their relationships is crucial for future preparedness.

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft
Watch The Interview
Biography
Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was ...

Under Attack: Exposing Upscale Hacktivist DDoS Tactics
This article explores the motives of hacktivist web-DDoS attacks on Australian assets, including government websites.

Benjamin Lamont & Helen Schneider – Australian Federal Police
Watch The Interview
Biography
Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben also oversees the development and deployment of the AFP’s information management, ...

How to Outsmart Ransomware and Build Resilience Within Your Organisation
Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their tactics, shifting from single to double and even triple extortion models. For example, ...
No results found.
In The News
New Trustwave Research Finds Patient Lives at Risk In Healthcare With Cybersecurity Vulnerabilities
March 27, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the healthcare sector. The combination of highly-sensitive patient data, legacy systems, increasing reliance on telehealth services, and more connected devices, means healthcare is a prime target for ...
The Great AI Divide: New Survey Finds Financial Services Leaders Struggle with Data Governance and Infrastructure Demands
Hitachi Vantara report reveals 84% of leaders fear catastrophic data loss as AI strains infrastructure and 41% say AI is already a critical part of their function
Proofpoint Establishes Global Strategic Alliance with Microsoft to Build on Azure and Strengthen Human-Centric Cybersecurity for Organisations
Companies deepen technology collaboration by making Azure the platform for Proofpoint innovation, providing joint customers with more powerful, seamless human-centric security
Trend Micro Customers Lower Cyber Risk Scores Through Proactive Security
Newly published report harnesses data from Trend’s platform insights on cyber risk
Fastly Empowers Organisations to Prioritise Security Without Disrupting End-User Experiences
Latest Fastly Bot Management update reduces CAPTCHA reliance, enhances bot detection, and highlights compromised credentials
Confluent launches Tableflow to power AI and next-gen applications
Data streaming company Confluent has announced today major advancements in Tableflow, the simplest way to access operational data from data lakes and warehouses. With Tableflow, all streaming data in Confluent Cloud can be accessed in popular open table formats, unlocking limitless possibilities for advanced analytics, real-time artificial ...
Shedding Light On the ABYSSWORKER Driver
Elastic Security Labs describes ABYSSWORKER, a malicious driver used with the MEDUSA ransomware attack-chain to disable anti-malware tools.
New Research Reveals 84% of Australian IT Leaders Trust AI Agents Equally or More than Humans
93% believe AI agents will deliver meaningful business outcomes in the next 12-18 months
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..